Closing down at least one local root exploit SRPM: kernel-linus-5.10.41-1.mga8.src.rpm i586: kernel-linus-5.10.41-1.mga8-1-1.mga8.i586.rpm kernel-linus-devel-5.10.41-1.mga8-1-1.mga8.i586.rpm kernel-linus-devel-latest-5.10.41-1.mga8.i586.rpm kernel-linus-doc-5.10.41-1.mga8.noarch.rpm kernel-linus-latest-5.10.41-1.mga8.i586.rpm kernel-linus-source-5.10.41-1.mga8-1-1.mga8.noarch.rpm kernel-linus-source-latest-5.10.41-1.mga8.noarch.rpm x86_64: kernel-linus-5.10.41-1.mga8-1-1.mga8.x86_64.rpm kernel-linus-devel-5.10.41-1.mga8-1-1.mga8.x86_64.rpm kernel-linus-devel-latest-5.10.41-1.mga8.x86_64.rpm kernel-linus-doc-5.10.41-1.mga8.noarch.rpm kernel-linus-latest-5.10.41-1.mga8.x86_64.rpm kernel-linus-source-5.10.41-1.mga8-1-1.mga8.noarch.rpm kernel-linus-source-latest-5.10.41-1.mga8.noarch.rpm
Mga 7 rpms: SRPM: kernel-linus-5.10.41-1.mga7.src.rpm i586: kernel-linus-5.10.41-1.mga7-1-1.mga7.i586.rpm kernel-linus-devel-5.10.41-1.mga7-1-1.mga7.i586.rpm kernel-linus-devel-latest-5.10.41-1.mga7.i586.rpm kernel-linus-doc-5.10.41-1.mga7.noarch.rpm kernel-linus-latest-5.10.41-1.mga7.i586.rpm kernel-linus-source-5.10.41-1.mga7-1-1.mga7.noarch.rpm kernel-linus-source-latest-5.10.41-1.mga7.noarch.rpm x86_64: kernel-linus-5.10.41-1.mga7-1-1.mga7.x86_64.rpm kernel-linus-devel-5.10.41-1.mga7-1-1.mga7.x86_64.rpm kernel-linus-devel-latest-5.10.41-1.mga7.x86_64.rpm kernel-linus-doc-5.10.41-1.mga7.noarch.rpm kernel-linus-latest-5.10.41-1.mga7.x86_64.rpm kernel-linus-source-5.10.41-1.mga7-1-1.mga7.noarch.rpm kernel-linus-source-latest-5.10.41-1.mga7.noarch.rpm
Whiteboard: (none) => MGA7TOOPriority: Normal => HighSummary: Update request: kernel-linus-5.10.41-1.mga8 => Update request: kernel-linus-5.10.41-1.mga8/7
Advisory, added to svn: type: security subject: Updated kernel-linus packages fix security vulnerability CVE: - CVE-2021-33200 src: 8: core: - kernel-linus-5.10.41-1.mga8 7: core: - kernel-linus-5.10.41-1.mga7 description: | This kernel-linus update is based on upstream 5.10.37 and fixes atleast the following security issue: kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux->alu_limit (CVE-2021-33200). For other upstream fixes, see the referenced changelogs. references: - https://bugs.mageia.org/show_bug.cgi?id=28981 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.38 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.39 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.40 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.41
Keywords: (none) => advisory
Keywords: (none) => validated_updateCC: (none) => sysadmin-bugsWhiteboard: MGA7TOO => MGA7TOO, MGA7-64-OK, MGA8-64-OK
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2021-0225.html
Resolution: (none) => FIXEDStatus: NEW => RESOLVED